Do My Essay!
Do not waste time. Get a complete paper today.
Our leading custom writing service provides custom written papers in 80+ disciplines. Order essays, research papers, term papers, book reviews, assignments, dissertation, thesis or extensive dissertations & our expert ENL writers will easily prepare a paper according to your requirements.
You’ll get your high quality plagiarism-free paper according to your deadline! No Bullshit!!
Special offer! Get 20% discount on your first order. Promo code: SAVE20
Question
1. Question :
Defenders-of-belief communities facilitate activities like:
customer service functions.
manufacturing and operations.
inbound logistics.
sales and marketing.
Question 2. Question :
If the content posted on a social networking site represents reasonable criticism of the organization’s products or services, the best response would most likely be to:
leave it.
edit it.
delete it.
report it.
Question 3. Question :
According to Gossieaux and Moran, which of the following activities are seekers of the truth most likely to facilitate?
Human resources
Operations
Marketing
Sales
Question 4. Question :
Which of the following is one of the principal means that companies implementing Web 2.0 are most likely to use to attract viewers?
Controlled releases
Fixed product value
Free content
Fixed interface
Question 5. Question :
According to Gossieaux and Moran, which of the following observations is true about a hyper-social organization?
It uses social media in an organization-centric manner.
It creates relationships in which only one of the parties perceives and gains value.
It is characterized by a transformation of thinking from market segments to tribes.
It is an organization that transitions from a dynamic process to a structured one.
Question 6. Question :
Which of the following is a risk associated with human resources when using social media to form conclusions about employees?
Loss of privacy of the employees
Loss of control over the employees
Decrease in efficiency of the evaluation process
Possibility of error on the site
Question 7. Question :
Which of the following is a significant risk of using social media for inbound and outbound logistics?
Loss of control
Loss of credibility
Loss of privacy
Loss of effectiveness
Question 8. Question :
According to Gossieaux and Moran, a(n) ________ is an organization that uses social media to transform its interactions with customers, employees, and partners into mutually satisfying relationships with them and their communities.
SM application provider
hyper-social organization
Enterprise 2.0
nonprofit organization
Question 9. Question :
When a student attends a business function for the purpose of meeting people and reinforcing relationships, he or she is investing in his or her:
human capital.
process capital.
social capital.
structural capital.
Question 10. Question :
Which of the following components of McAfee’s Enterprise 2.0 Model involves the creation of enterprise content via blogs, wikis, discussion groups, presentations, etc.?
Search
Authoring
Extensions
Signals
Question 11. Question :
The primary risk of peer-to-peer support in the context of social media and customer service is:
loss of control.
loss of credibility.
lack of privacy.
increase in expenses.
Question 12. Question :
________ is the use of information technology to support the sharing of content among networks of users.
Social media
Content publishing
Multimedia
Programming
Question 13. Question :
Being linked to a network of highly regarded contacts is a form of:
social credential.
viral marketing.
crowdsourcing.
human capital.
Question 14. Question :
Which of the following is an SM application provider?
Oracle
SAP
McAfee
Question 15. Question :
Social capital, unlike traditional capital:
appreciates with time and never depreciates.
depreciates with time and never appreciates.
sometimes depreciates and at other times appreciates with time.
remains constant with time.
Question 16. Question :
Tasks in the ________ phase of the SDLC include building and testing system components and converting users to the new system.
system definition
component design
system maintenance
system implementation
Question 17. Question :
Which of the following can be represented using the Business Process Modeling Notation?
Gantt charts
As-is models
Scatter plots
PERT charts showing the critical path
Question 18. Question :
The situation where addition of resources creates inefficiencies is known as:
diseconomies of scale.
marginal utility.
marginal returns.
break-even.
Question 19. Question :
In a Business Process Modeling Notation (BPMN) diagram, a ________ symbol represents an activity.
dotted arrow
rectangle
diamond
solid arrow
Question 20. Question :
A ________ is a sequence of activities that determine the earliest date by which a project can be completed.
Venn diagram
Pareto chart
critical path
scatter plot
Question 21. Question :
In a business process, a role refers to:
a physical repository.
the movement of data.
a collection of data.
a collection of activities.
Question 22. Question :
In a business process, resources are:
people or computer applications that are assigned to roles.
collections of procedures and activities.
the total number of points of work that can be accomplished in each scrum period.
collections of related tasks that receive inputs and produce outputs.
Question 23. Question :
Which of the following is true of paired programming?
Two team members write the same program by coordinating from different locations.
Two programs are run simultaneously on one device.
Two processors are required to run one program.
Two team members share the same computer to write a computer program together.
Question 24. Question :
Which of the following are the steps in the business process management (BPM) cycle?
Model processes; implement processes; assess results; create components
Create components; model processes; implement processes; assess results
Implement processes; create components; model processes; assess results
Model processes; create components; implement processes; assess results
Question 25. Question :
The term ________ refers to a set of management policies, practices, and tools that developers use to maintain control over the SDLC project’s resources.
swim-lane layout
trade-off
transmission control protocol
configuration control
Question 26. Question :
The first step in the system definition phase of the systems development life cycle (SDLC) is to:
plan the project.
conduct a feasibility study.
determine the goals and scope.
form the project team.
Question 27. Question :
The traditional process for developing information systems is:
the spiral approach.
the systems development life cycle.
rapid application development cycle.
the V-model.
Question 28. Question :
The first phase of the systems development life cycle (SDLC) is:
defining the system.
implementing the system.
determining the requirements.
maintaining the system.
Question 29. Question :
A ________ is a person who is well versed in an organization’s strategy and focuses on ensuring that business processes and information systems meet the organization’s competitive strategies.
business analyst
business application programmer
business administrator
business supervisor
Question 30. Question :
According to Brooks’ Law, adding more people to a late project will:
guarantee efficiencies.
speed up the project.
create diseconomies of scale.
reduce the need for coordination.
Question 31. Question :
Which of the following is considered a computer crime?
Deletion of records by an employee who is unaware of operating procedures
Poorly written programs resulting in data losses
Loss of data as a result of flooding
Hacking of information systems
Question 32. Question :
Mark is transferring funds online through the Web site of a reputed bank. Which of the following will be displayed in the address bar of his browser that will let him know that the bank is using the SSL protocol?
ftp
www
https
.com
Question 33. Question :
Which of the following systems procedures is specifically the responsibility of operations personnel?
Writing software program codes
Using systems to perform job tasks
Creating back up of system databases
Knowing whom to contact when a security breach occurs
Question 34. Question :
A ________ examines each part of a message and determines whether to let that part pass.
packet-filtering firewall
private key
mail server
drive-by sniffer
Question 35. Question :
In asymmetric encryption, each site has a ________ for encoding messages.
Student Answer: botnet
private key
public key
cookie
Question 36. Question :
Firewalls produce ________ which include lists of all dropped packets, infiltration attempts, and unauthorized access attempts from within the firewall.
honeypots
blogs
activity logs
RSS feeds
Question 37. Question :
Which of the following is likely to be accepted by a poorly designed application, leading to improper disclosure of data?
Public key
Asymmetric encryption
Key escrow
SQL injection
Question 38. Question :
________ is the type of security loss that involves computer criminals invading a computer system and replacing legitimate programs with their own unauthorized ones that shut down legitimate applications and substitute their own processing to spy, steal, and manipulate data.
Encryption
Spoofing
Phishing
Usurpation
Question 39. Question :
Which of the following is considered a threat caused by human error?
An employee inadvertently installs an old database on top of the current one
An employee intentionally destroys data and system components
A virus and worm writer infects computer systems
A hacker breaks into a system to steal for financial gain
Question 40. Question :
________ involve the people and procedure components of information systems.
Firewalls
Technical safeguards
Human safeguards
Payloads
Question 41. Question :
________ involves accomplishing job tasks during failure.
Authentication
Hardening
Usurpation
Recovery
Question 42. Question :
A ________ is a number used to encrypt data.
key
honeypot
cookie
cache
Question 43. Question :
With ________, the sender and receiver transmit a message using different keys.
asymmetric encryption
block cipher
symmetric encryption
stream cipher
Question 44. Question :
Removing and disabling ________, which may contain sensitive security data, presents an excellent example of the trade-off between improved security and cost.
bookmarks
pop-ups
cookies
toolbars
Question 45. Question :
When an employee is terminated, IS administrators should receive advance notice so that they can:
destroy the employee’s records.
plan for new recruitment.
disseminate information.
remove the user account and password.
Question 46. Question :
The bullwhip effect:
is not related to erratic consumer demand.
forces distributors, manufacturers, and suppliers to carry smaller inventories that do not have the capacity to meet requirements.
increases the overall profitability of the supply chain.
can be eliminated by restricting access to consumer-demand information to only a few participants in the supply chain.
Question 47. Question :
Which of the following statements is true of a supply chain?
All members of the supply chain of a firm must have close geographical proximity.
Every supply chain should include suppliers, manufacturers, distributors, retailers, and customers.
Each organization in a chain is connected to just one company up and down the chain.
A supply chain includes transportation companies, warehouses, and inventories.
Question 48. Question :
An order processing functional system located in the United States operates in English and reflects the practices and culture of the United States. Its manufacturing systems business partner located in Taiwan, operates in Chinese and reflects the business practices and culture of Taiwan. They do not accommodate language, business, or their cultural differences into a single system. From the above scenario, which of the following statements is true about the functional systems?
The order processing functional system will eventually be forced to operate in Chinese to reflect the business practices and culture of Taiwan.
The use of enterprise systems, such as ERP, would complicate the existing situation and thus increase data isolation.
Lack of integration will be extremely disadvantageous to the manufacturing systems unit but not to the order processing unit.
The systems can operate independently as long as there is an adequate data interface between them.
Question 49. Question :
The principal planning task for an international IS organization is to:
localize software packages to focus on quantity more than quality.
setup IS departments for every process in all of its branches.
integrate the organization’s information systems with the outsourced vendors’ information systems.
align IT and IS resources with the organization’s competitive strategy.
Question 50. Question :
Which of the following components of an IS is the easiest to adapt to internationalization?
Hardware
User interfaces
Procedures
Data